Books 2 Byte
Mark Stamp’s Information Security
Deven N. Shah
If your application is on the enterprise’s Intranet, configure it to use Windows integrated security, advises Deven N. Shah in Mark Stamp’s Information Security: Principles and practice. That way, he says, the user’s logon credentials can be used for accessing resources.